Cryptography

Results: 21893



#Item
461Cryptography / Records management technology / Signature / Animal and Plant Health Inspection Service / Key management / Digital signature / Electronic signature

e-SignLive-logo-screen

Add to Reading List

Source URL: www.esignlive.com

Language: English - Date: 2016-01-26 06:04:53
462Abstract algebra / Geometry / Group theory / Algebra / Analytic number theory / Elliptic curve / Position / Elliptic curves / Elliptic curve cryptography

Intro Background 4-dim GLV dec. E

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-09-20 10:31:31
463Cryptography / E-commerce / Cryptographic software / RSA / OpenSSL / Modular arithmetic / Timing attack / Side-channel attack / Montgomery modular multiplication / David Brumley / Karatsuba algorithm / Data Encryption Standard

Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
464Computing / Security / Computer network security / Prevention / Crime prevention / Cryptography / Information governance / National security / CyberCIEGE / Server / Computer security / Email

Microsoft Word - csetCyberCIEGE110609final.docx

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:25
465Cryptography / Labor in the Philippines / Department of Labor and Employment / Intramuros / Dole / Manila / Organisation of Islamic Cooperation / Public key certificate / Sipag Pinoy

Republic of the Philippines DEPARTMENT OF LABOR AND EMPLOYMENT Muralla St., Intramuros, Manila Certificate No.: AJA15PUBLICATION OF VACANT POSITIONS

Add to Reading List

Source URL: www.dole.gov.ph

Language: English - Date: 2016-04-13 02:33:36
466Computer access control / Obfuscation / Computer security / Cryptography / Password / Security / Brute-force attack / Password policy / Password psychology

Of Passwords and People: Measuring the Effect of Password-Composition Policies Saranga Komanduri1 , Richard Shay1 , Patrick Gage Kelley1 , Michelle L. Mazurek1 , Lujo Bauer1 , Nicolas Christin1 , Lorrie Faith Cranor1 , a

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-08-21 11:38:22
467Law / Health informatics / Health Insurance Portability and Accountability Act / Medical privacy / Health / Privacy / Protected health information / Cryptography / Confidentiality / Medical record / Internet privacy / Patient Safety and Quality Improvement Act

Microsoft Word - C150 PrivPractPolicy-Eng

Add to Reading List

Source URL: unmmg.org

Language: English - Date: 2016-05-23 19:46:52
468Cryptography / Encodings / X.690 / Computing / Information / Abstract Syntax Notation One / PKCS 1 / Padding / Hash function / Octet / Cryptographic hash function / RSA

ASN.1 parsing in crypto libraries: what could go wrong? Andrew Furtak, Yuriy Bulygin, Alex Bazhaniuk Advanced Threat Research

Add to Reading List

Source URL: www.intelsecurity.com

Language: English - Date: 2016-05-02 12:28:32
469Cryptography / Abstract algebra / Algebra / Group theory / Finite fields / Elliptic curve cryptography / Public-key cryptography / Elliptic curves / Weil pairing / Elliptic curve / Elliptic Curve Digital Signature Algorithm / Discrete logarithm

ECC Summer School – Exercices Damien RobertCryptography Implement public key encryption and signature with elliptic curves:

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-09-25 11:36:46
470Cryptography / Public-key cryptography / DiffieHellman key exchange / Elliptic curve cryptography / Finite fields / SPEKE / Elliptic curve DiffieHellman

Algorithm and Implementation Optimisation of Cryptographic Computation over Elliptic Curves (F2m ) Jean-Marc ROBERT Team DALI/LIRMM, University of Perpignan, France Perpignan, the 30th of may 2012

Add to Reading List

Source URL: raim2012.u-bourgogne.fr

Language: English - Date: 2012-07-16 09:25:38
UPDATE